scispace - formally typeset
Proceedings ArticleDOI

An efficient & secure encryption scheme for biometric data using holmes map & singular value decomposition

Reads0
Chats0
TLDR
Experimental results shows that the proposed algorithm is lossless in nature, robust against statistical attacks and has high key sensitivity, and low PSNR values indicate thatThe proposed algorithm provides a high level of perceptual security for the biometric data.
Abstract
In the recent past we have been facing security challenges towards the transmission of biometric data over unsecured data channels. A lot of techniques have been developed and implemented for the secure transmission of the data. Taking the security concept in mind we introduce an efficient method based on chaotic theory for secured data transmission. The core idea of the proposed method is to shuffle the adjacent pixel correlation using the combination of Arnold Cat Map, Holmes Map and Singular Value Decomposition (SVD). The pixel values are scrambled using the Arnold Cat Map and further Holmes Map and SVD are used to alter the pixel values to complicate the relationship. Finally, decryption method is proposed to reconstruct the original data from encrypted data. Performance of proposed algorithm has been experimentally analyzed using statistical attack analysis, key sensitivity analysis and Peak Signal to Noise Ratio (PSNR). Experimental results shows that the proposed algorithm is lossless in nature, robust against statistical attacks and has high key sensitivity. Further low PSNR values indicate that the proposed algorithm provides a high level of perceptual security for the biometric data.

read more

Citations
More filters
Journal ArticleDOI

Hybrid Multi-Biometric Template Protection Using Watermarking

TL;DR: This paper aims to demonstrate the efforts towards in-situ applicability of EMMARM, as to provide real-time information about the response of the immune system to EMTs.
Book ChapterDOI

A Secure Encryption Method for Biometric Templates Based on Chaotic Theory

TL;DR: The proposed algorithm has good key sensitivity, robustness against statistical and differential attacks and an efficient and lossless method for encrypting biometric templates.
Proceedings ArticleDOI

Biometric data encryption using 3-D chaotic system

TL;DR: Experimental results show the resistant of proposed algorithm against perceptual and brute force attacks makes it suitable for transmission of biometric data over open and shared networks.
Journal ArticleDOI

An Efficient and Lossless Cryptosystem for Security in Tele-Ophthalmology Applications Using Chaotic Theory

TL;DR: An efficient and lossless cryptosystem based upon chaotic theory for encryption of medical fundus images based upon scrambling and substitution architecture is proposed which is suitable for real time applications.
Proceedings ArticleDOI

Biometric data security using Fractional Fourier Transform and chaotic theory

TL;DR: This paper presents an efficient and lossless encryption scheme based on transformation and chaotic domain to achieve high level of data confidentiality and security and is highly resistant to statistical and crypt analytical attacks.
References
More filters
Journal ArticleDOI

Singular value decomposition and least squares solutions

TL;DR: The decomposition of A is called the singular value decomposition (SVD) and the diagonal elements of ∑ are the non-negative square roots of the eigenvalues of A T A; they are called singular values.
Journal ArticleDOI

Biometric template security

TL;DR: This work presents a high-level categorization of the various vulnerabilities of a biometric system and discusses countermeasures that have been proposed to address these vulnerabilities.
Journal ArticleDOI

Biometrics: a tool for information security

TL;DR: An overview of biometrics is provided and some of the salient research issues that need to be addressed for making biometric technology an effective tool for providing information security are discussed.
Journal ArticleDOI

Biometric template security

Abhishek Nagar
- 01 Jan 2009 - 
Journal ArticleDOI

Image encryption based on a new total shuffling algorithm

TL;DR: The experimental results demonstrate that the new image total shuffling algorithm has a low time complexity and the suggested encryption algorithm of image has the advantages of large key space and high security, and moreover, the distribution of grey values of the encrypted image has a random-like behavior.
Related Papers (5)